Exploitation Summary
EIP tracks 1 public exploit for CVE-2009-4607. PoCs published by trompele.
AI-analyzed exploit summary This exploit leverages the 'less' pager in Snap Server 410's GuardianOS 5.1.041 to escalate privileges from uid=1 (admin) to uid=0 (root) by executing '/bin/sh' via the '!' command in 'less'. It is a straightforward local privilege escalation technique.
Description
The command line interface in Overland Storage Snap Server 410 with GuardianOS 5.1.041 runs the "less" utility with a higher-privileged uid than the CLI user and without sufficient restriction on shell escapes, which allows local users to gain privileges using the "!" character within less to access a privileged shell.
Exploits (1)
This exploit leverages the 'less' pager in Snap Server 410's GuardianOS 5.1.041 to escalate privileges from uid=1 (admin) to uid=0 (root) by executing '/bin/sh' via the '!' command in 'less'. It is a straightforward local privilege escalation technique.